Journal: Computers & Security

Volume 25, Issue 1

1 -- 2E. Eugene Schultz. Dilemmas and boundaries of digital rights management
18 -- 26C. M. Roberts. Radio frequency identification (RFID)
27 -- 35Steven Furnell, Adila Jusoh, Dimitris Katsabas. The challenges of understanding and using security: A survey of end-users
36 -- 44Indrakshi Ray, Mahendra Kumar. Towards a location-based mandatory access control model
45 -- 51Christos K. Dimitriadis, Despina Polemi. An identity management protocol for Internet applications over 3G mobile networks
52 -- 54Raphael Chung-Wei Phan. Cryptanalysis of two password-based authentication schemes using smart cards
55 -- 63Neil F. Doherty, Heather Fulford. Aligning the information security policy with the strategic information systems plan
64 -- 71Julio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho. Steganography in games: A general methodology and its application to the game of Go
72 -- 77Wen-Gong Shieh, Jian-Min Wang. Efficient remote mutual authentication and key agreement